<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet href="dsa-rdf.css" type="text/css"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xml:lang="en">
<channel rdf:about="https://www.debian.org/security/dsa.rdf">
  <title>Debian Security</title>
  <link>http://security.debian.org/</link>
  <description>
Debian Security Advisories
  </description>
  <dc:date>2018-06-22T23:33:21+00:00</dc:date>
  <items>
    <rdf:Seq>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4233"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4232"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4231"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4230"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4229"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4228"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4227"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4226"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4225"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4224"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4223"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4222"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4221"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4220"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4219"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4218"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4217"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4216"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4215"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4214"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4213"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4212"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4211"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4210"/>
<rdf:li resource="https://www.debian.org/security/2018/dsa-4209"/>
    </rdf:Seq>
  </items>
</channel>
<item rdf:about="https://www.debian.org/security/2018/dsa-4233">
  <title>DSA-4233 bouncycastle - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4233</link>
  <description>
&lt;p&gt;It was discovered that the low-level interface to the RSA key pair
generator of Bouncy Castle (a Java implementation of cryptographic
algorithms) could perform less Miller-Rabin primality tests than
expected.&lt;/p&gt;
  </description>
  <dc:date>2018-06-22</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4232">
  <title>DSA-4232 xen - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4232</link>
  <description>
&lt;p&gt;This update provides mitigations for the &lt;q&gt;lazy FPU&lt;/q&gt; vulnerability
affecting a range of Intel CPUs, which could result in leaking CPU
register states belonging to another vCPU previously scheduled on the
same CPU. For additional information please refer to
&lt;a href="https://xenbits.xen.org/xsa/advisory-267.html"&gt;https://xenbits.xen.org/xsa/advisory-267.html&lt;/a&gt;&lt;/p&gt;
  </description>
  <dc:date>2018-06-20</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4231">
  <title>DSA-4231 libgcrypt20 - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4231</link>
  <description>
&lt;p&gt;It was discovered that Libgcrypt is prone to a local side-channel attack
allowing recovery of ECDSA private keys.&lt;/p&gt;
  </description>
  <dc:date>2018-06-17</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4230">
  <title>DSA-4230 redis - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4230</link>
  <description>
&lt;p&gt;Multiple vulnerabilities were discovered in the Lua subsystem of Redis, a
persistent key-value database, which could result in denial of service.&lt;/p&gt;
  </description>
  <dc:date>2018-06-17</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4229">
  <title>DSA-4229 strongswan - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4229</link>
  <description>
&lt;p&gt;Two vulnerabilities were discovered in strongSwan, an IKE/IPsec suite.&lt;/p&gt;
  </description>
  <dc:date>2018-06-14</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4228">
  <title>DSA-4228 spip - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4228</link>
  <description>
&lt;p&gt;Several vulnerabilities were found in SPIP, a website engine for
publishing, resulting in cross-site scripting and PHP injection.&lt;/p&gt;
  </description>
  <dc:date>2018-06-14</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4227">
  <title>DSA-4227 plexus-archiver - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4227</link>
  <description>
&lt;p&gt;Danny Grander discovered a directory traversal flaw in plexus-archiver,
an Archiver plugin for the Plexus compiler system, allowing an attacker
to overwrite any file writable by the extracting user via a specially
crafted Zip archive.&lt;/p&gt;
  </description>
  <dc:date>2018-06-12</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4226">
  <title>DSA-4226 perl - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4226</link>
  <description>
&lt;p&gt;Jakub Wilk discovered a directory traversal flaw in the Archive::Tar
module, allowing an attacker to overwrite any file writable by the
extracting user via a specially crafted tar archive.&lt;/p&gt;
  </description>
  <dc:date>2018-06-12</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4225">
  <title>DSA-4225 openjdk-7 - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4225</link>
  <description>
&lt;p&gt;Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in denial of
service, sandbox bypass, execution of arbitrary code or bypass of JAR
signature validation.&lt;/p&gt;
  </description>
  <dc:date>2018-06-10</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4224">
  <title>DSA-4224 gnupg - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4224</link>
  <description>
&lt;p&gt;Marcus Brinkmann discovered that GnuPG performed insufficient
sanitisation of file names displayed in status messages, which could be
abused to fake the verification status of a signed email.&lt;/p&gt;
  </description>
  <dc:date>2018-06-08</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4223">
  <title>DSA-4223 gnupg1 - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4223</link>
  <description>
&lt;p&gt;Marcus Brinkmann discovered that GnuPG performed insufficient
sanitisation of file names displayed in status messages, which could be
abused to fake the verification status of a signed email.&lt;/p&gt;
  </description>
  <dc:date>2018-06-08</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4222">
  <title>DSA-4222 gnupg2 - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4222</link>
  <description>
&lt;p&gt;Marcus Brinkmann discovered that GnuPG performed insufficient
sanitisation of file names displayed in status messages, which could be
abused to fake the verification status of a signed email.&lt;/p&gt;
  </description>
  <dc:date>2018-06-08</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4221">
  <title>DSA-4221 libvncserver - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4221</link>
  <description>
&lt;p&gt;Alexander Peslyak discovered that insufficient input sanitising of RFB
packets in LibVNCServer could result in the disclosure of memory
contents.&lt;/p&gt;
  </description>
  <dc:date>2018-06-08</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4220">
  <title>DSA-4220 firefox-esr - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4220</link>
  <description>
&lt;p&gt;Ivan Fratric discovered a buffer overflow in the Skia graphics library
used by Firefox, which could result in the execution of arbitrary code.&lt;/p&gt;
  </description>
  <dc:date>2018-06-08</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4219">
  <title>DSA-4219 jruby - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4219</link>
  <description>
&lt;p&gt;Several vulnerabilities were discovered in jruby, a Java
implementation of the Ruby programming language. They would allow an
attacker to use specially crafted gem files to mount cross-site
scripting attacks, cause denial of service through an infinite loop,
write arbitrary files, or run malicious code.&lt;/p&gt;
  </description>
  <dc:date>2018-06-08</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4218">
  <title>DSA-4218 memcached - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4218</link>
  <description>
&lt;p&gt;Several vulnerabilities were discovered in memcached, a high-performance
memory object caching system. The Common Vulnerabilities and Exposures
project identifies the following problems:&lt;/p&gt;
  </description>
  <dc:date>2018-06-06</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4217">
  <title>DSA-4217 wireshark - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4217</link>
  <description>
&lt;p&gt;It was discovered that Wireshark, a network protocol analyzer, contained
several vulnerabilities in the dissectors for PCP, ADB, NBAP, UMTS MAC,
IEEE 802.11, SIGCOMP, LDSS, GSM A DTAP and Q.931, which result in denial
of service or the execution of arbitrary code.&lt;/p&gt;
  </description>
  <dc:date>2018-06-03</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4216">
  <title>DSA-4216 prosody - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4216</link>
  <description>
&lt;p&gt;It was discovered that Prosody, a lightweight Jabber/XMPP server, does
not properly validate client-provided parameters during XMPP stream
restarts, allowing authenticated users to override the realm associated
with their session, potentially bypassing security policies and allowing
impersonation.&lt;/p&gt;
  </description>
  <dc:date>2018-06-02</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4215">
  <title>DSA-4215 batik - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4215</link>
  <description>
&lt;p&gt;Man Yue Mo, Lars Krapf and Pierre Ernst discovered that Batik, a
toolkit for processing SVG images, did not properly validate its
input. This would allow an attacker to cause a denial-of-service,
mount cross-site scripting attacks, or access restricted files on the
server.&lt;/p&gt;
  </description>
  <dc:date>2018-06-02</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4214">
  <title>DSA-4214 zookeeper - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4214</link>
  <description>
&lt;p&gt;It was discovered that Zookeeper, a service for maintaining configuration
information, enforced no authentication/authorisation when a server
attempts to join a Zookeeper quorum.&lt;/p&gt;
  </description>
  <dc:date>2018-06-01</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4213">
  <title>DSA-4213 qemu - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4213</link>
  <description>
&lt;p&gt;Several vulnerabilities were discovered in qemu, a fast processor
emulator.&lt;/p&gt;
  </description>
  <dc:date>2018-05-29</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4212">
  <title>DSA-4212 git - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4212</link>
  <description>
&lt;p&gt;Etienne Stalmans discovered that git, a fast, scalable, distributed
revision control system, is prone to an arbitrary code execution
vulnerability exploitable via specially crafted submodule names in a
.gitmodules file.&lt;/p&gt;
  </description>
  <dc:date>2018-05-29</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4211">
  <title>DSA-4211 xdg-utils - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4211</link>
  <description>
&lt;p&gt;Gabriel Corona discovered that xdg-utils, a set of tools for desktop
environment integration, is vulnerable to argument injection attacks. If
the environment variable BROWSER in the victim host has a "%s" and the
victim opens a link crafted by an attacker with xdg-open, the malicious
party could manipulate the parameters used by the browser when opened.
This manipulation could set, for example, a proxy to which the network
traffic could be intercepted for that particular execution.&lt;/p&gt;
  </description>
  <dc:date>2018-05-25</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4210">
  <title>DSA-4210 xen - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4210</link>
  <description>
&lt;p&gt;This update provides mitigations for the Spectre v4 variant in x86-based
micro processors. On Intel CPUs this requires updated microcode which
is currently not released publicly (but your hardware vendor may have
issued an update). For servers with AMD CPUs no microcode update is
needed, please refer to &lt;a href="https://xenbits.xen.org/xsa/advisory-263.html"&gt;https://xenbits.xen.org/xsa/advisory-263.html&lt;/a&gt; for further information.&lt;/p&gt;
  </description>
  <dc:date>2018-05-25</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2018/dsa-4209">
  <title>DSA-4209 thunderbird - security update</title>
  <link>https://www.debian.org/security/2018/dsa-4209</link>
  <description>
&lt;p&gt;Multiple security issues have been found in Thunderbird, which may lead
to the execution of arbitrary code, denial of service or attacks on
encrypted emails.&lt;/p&gt;
  </description>
  <dc:date>2018-05-25</dc:date>
</item>
</rdf:RDF>
